CVE-2024-35900
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/05/2024
Last modified:
17/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: nf_tables: reject new basechain after table flag update<br />
<br />
When dormant flag is toggled, hooks are disabled in the commit phase by<br />
iterating over current chains in table (existing and new).<br />
<br />
The following configuration allows for an inconsistent state:<br />
<br />
add table x<br />
add chain x y { type filter hook input priority 0; }<br />
add table x { flags dormant; }<br />
add chain x w { type filter hook input priority 1; }<br />
<br />
which triggers the following warning when trying to unregister chain w<br />
which is already unregistered.<br />
<br />
[ 127.322252] WARNING: CPU: 7 PID: 1211 at net/netfilter/core.c:50 1 __nf_unregister_net_hook+0x21a/0x260<br />
[...]<br />
[ 127.322519] Call Trace:<br />
[ 127.322521] <br />
[ 127.322524] ? __warn+0x9f/0x1a0<br />
[ 127.322531] ? __nf_unregister_net_hook+0x21a/0x260<br />
[ 127.322537] ? report_bug+0x1b1/0x1e0<br />
[ 127.322545] ? handle_bug+0x3c/0x70<br />
[ 127.322552] ? exc_invalid_op+0x17/0x40<br />
[ 127.322556] ? asm_exc_invalid_op+0x1a/0x20<br />
[ 127.322563] ? kasan_save_free_info+0x3b/0x60<br />
[ 127.322570] ? __nf_unregister_net_hook+0x6a/0x260<br />
[ 127.322577] ? __nf_unregister_net_hook+0x21a/0x260<br />
[ 127.322583] ? __nf_unregister_net_hook+0x6a/0x260<br />
[ 127.322590] ? __nf_tables_unregister_hook+0x8a/0xe0 [nf_tables]<br />
[ 127.322655] nft_table_disable+0x75/0xf0 [nf_tables]<br />
[ 127.322717] nf_tables_commit+0x2571/0x2620 [nf_tables]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.262 (including) | 5.4.274 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.202 (including) | 5.10.215 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13.1 (including) | 5.15.154 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.85 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.26 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/41bad13c0e8a5a2b47a7472cced922555372daab
- https://git.kernel.org/stable/c/420132bee3d0136b7fba253a597b098fe15493a7
- https://git.kernel.org/stable/c/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8
- https://git.kernel.org/stable/c/745cf6a843896cdac8766c74379300ed73c78830
- https://git.kernel.org/stable/c/7b6fba6918714afee3e17796113ccab636255c7b
- https://git.kernel.org/stable/c/8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb
- https://git.kernel.org/stable/c/994209ddf4f430946f6247616b2e33d179243769
- https://git.kernel.org/stable/c/e95bb4cba94c018be24b11f017d1c55dd6cda31a
- https://git.kernel.org/stable/c/41bad13c0e8a5a2b47a7472cced922555372daab
- https://git.kernel.org/stable/c/420132bee3d0136b7fba253a597b098fe15493a7
- https://git.kernel.org/stable/c/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8
- https://git.kernel.org/stable/c/745cf6a843896cdac8766c74379300ed73c78830
- https://git.kernel.org/stable/c/7b6fba6918714afee3e17796113ccab636255c7b
- https://git.kernel.org/stable/c/8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb
- https://git.kernel.org/stable/c/994209ddf4f430946f6247616b2e33d179243769
- https://git.kernel.org/stable/c/e95bb4cba94c018be24b11f017d1c55dd6cda31a
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html



